CoreStream 2.9 Release Notes

It is difficult to choose which features to highlight in 2.9. Despite it being holiday season for a lot of us, we have been extremely busy shaping, scoping and delivering our release. And we have covered a lot of ground. The CoreStream risk bowtie that was revamped earlier this year has now had additional features…

Richard Eddolls Avatar
CoreStream GRC logo against dark blue background and blue and green gradient

It is difficult to choose which features to highlight in 2.9. Despite it being holiday season for a lot of us, we have been extremely busy shaping, scoping and delivering our release. And we have covered a lot of ground.

The CoreStream risk bowtie that was revamped earlier this year has now had additional features added so that users are able to add and edit content via the bow tie itself rather than using the underlying risk form to do so. We can even do this and support the many to many relationship structure, meaning the same action or control can be mitigating multiple causes or consequences.

Another feature focused typically on risk related requirements is the aggregation chart. CoreStream is now able to present risk data that has been reassessed according to the thresholds associated with the level it is being displayed. For instance, a £100k risk may be material when viewed at a project level but the impact typically needs to be readjusted when looking at the same risk at an organisation wide level.

2.9 also includes a feature that will help our support team respond to your queries even more quickly than they do today. We have the feature that allows us to mimic the permissions of a user profile so that we are able to view the same screens, data and action options as that user. We are conscious of the security implications here, so this is very much an admin only feature!

Finally, one of our perennial objectives at CoreStream is to make lives easier. We have introduced a number of form features (instant validation, improvements to our consolidated hierarchy fields) and wider improvements (highlighting the row you just edited, direct links from summary emails) to help us continue along this journey. As ever, client and partner feedback are extremely valuable in this endeavor so please do keep it coming.

Thanks,
Rich

  • From compliance to confidence: a practical guide to a proactive always on data privacy program

    From compliance to confidence: a practical guide to a proactive always on data privacy program

    Most large organizations say they have privacy covered. And on paper, they do. In practice, privacy often lives as disconnected work: documents, templates, and one-off reviews that prove something happened once, not a system that controls what happens next. That gap matters because privacy risk is created by change. A new analytics use case. A…

  • DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

    DORA just got a UK handshake: the EU – UK ICT oversight pact is a warning shot for third-party risk

    If your business depends on a small set of shared providers like cloud, identity, payments, or data platforms, your operational resilience risk is no longer just a “your firm” issue. It’s a system wide dependency. Regulators are now shifting supervision to where that risk sits: at the provider level, not just inside each regulated company.…

  • Beyond the checkbox: A value‑based guide to enterprise conflict of interest management

    Beyond the checkbox: A value‑based guide to enterprise conflict of interest management

    The conflict-of-interest wake-up call Most organizations do have a conflict of interest (COI) policy.  What they actually have, in practice, is this:  Legacy GRC will tell you that’s “good coverage.” It isn’t. It’s paperwork.  Conflicts of interest rarely blow up because they were hidden. They blow up because they were normalized, misunderstood, or never escalated until after a decision was made and challenged.  If you’re trying to run effective value-based…